
Also, when generating RSA keys in JS, generate them with p < q, as per the spec. Also, when generating RSA keys using Web Crypto or Node crypto, swap the generated p and q around, so that will satisfy p < q in most browsers (but not old Microsoft Edge, 50% of the time) and so that we can use the generated u coefficient (p^-1 mod q in OpenPGP, q^-1 mod p in RFC3447). Then, when signing and verifying, swap p and q again, so that the key hopefully satisfies Safari's requirement that p > q, and so that we can keep using u again.
142 lines
6.6 KiB
JavaScript
142 lines
6.6 KiB
JavaScript
const openpgp = typeof window !== 'undefined' && window.openpgp ? window.openpgp : require('../../dist/openpgp');
|
|
const chai = require('chai');
|
|
|
|
chai.use(require('chai-as-promised'));
|
|
|
|
const expect = chai.expect;
|
|
|
|
/* eslint-disable no-unused-expressions */
|
|
/* eslint-disable no-invalid-this */
|
|
const native = openpgp.util.getWebCrypto() || openpgp.util.getNodeCrypto();
|
|
(!native ? describe.skip : describe)('basic RSA cryptography with native crypto', function () {
|
|
it('generate rsa key', async function() {
|
|
const bits = openpgp.util.getWebCryptoAll() ? 2048 : 1024;
|
|
const keyObject = await openpgp.crypto.publicKey.rsa.generate(bits, "10001");
|
|
expect(keyObject.n).to.exist;
|
|
expect(keyObject.e).to.exist;
|
|
expect(keyObject.d).to.exist;
|
|
expect(keyObject.p).to.exist;
|
|
expect(keyObject.q).to.exist;
|
|
expect(keyObject.u).to.exist;
|
|
});
|
|
|
|
it('sign and verify using generated key params', async function() {
|
|
const bits = openpgp.util.getWebCryptoAll() ? 2048 : 1024;
|
|
const keyParams = await openpgp.crypto.generateParams(openpgp.enums.publicKey.rsa_sign, bits);
|
|
const message = await openpgp.crypto.random.getRandomBytes(64);
|
|
const hash_algo = openpgp.enums.write(openpgp.enums.hash, 'sha256');
|
|
const hashed = await openpgp.crypto.hash.digest(hash_algo, message);
|
|
const n = keyParams[0].toUint8Array();
|
|
const e = keyParams[1].toUint8Array();
|
|
const d = keyParams[2].toUint8Array();
|
|
const p = keyParams[3].toUint8Array();
|
|
const q = keyParams[4].toUint8Array();
|
|
const u = keyParams[5].toUint8Array();
|
|
const signature = await openpgp.crypto.publicKey.rsa.sign(hash_algo, message, n, e, d, p, q, u, hashed);
|
|
expect(signature).to.exist;
|
|
const verify = await openpgp.crypto.publicKey.rsa.verify(hash_algo, message, signature, n, e, hashed);
|
|
expect(verify).to.be.true;
|
|
});
|
|
|
|
it('compare webCrypto and bn math sign', async function() {
|
|
if (!openpgp.util.getWebCrypto()) {
|
|
this.skip();
|
|
}
|
|
const bits = openpgp.util.getWebCrypto() ? 2048 : 1024;
|
|
const keyParams = await openpgp.crypto.generateParams(openpgp.enums.publicKey.rsa_sign, bits);
|
|
const n = keyParams[0].toUint8Array();
|
|
const e = keyParams[1].toUint8Array();
|
|
const d = keyParams[2].toUint8Array();
|
|
const p = keyParams[3].toUint8Array();
|
|
const q = keyParams[4].toUint8Array();
|
|
const u = keyParams[5].toUint8Array();
|
|
const message = await openpgp.crypto.random.getRandomBytes(64);
|
|
const hashName = 'sha256';
|
|
const hash_algo = openpgp.enums.write(openpgp.enums.hash, hashName);
|
|
const hashed = await openpgp.crypto.hash.digest(hash_algo, message);
|
|
let signatureWeb;
|
|
try {
|
|
signatureWeb = await openpgp.crypto.publicKey.rsa.webSign('SHA-256', message, n, e, d, p, q, u, hashed);
|
|
} catch (error) {
|
|
openpgp.util.print_debug_error('web crypto error');
|
|
this.skip();
|
|
}
|
|
const signatureBN = await openpgp.crypto.publicKey.rsa.bnSign(hash_algo, n, d, hashed);
|
|
expect(openpgp.util.Uint8Array_to_hex(signatureWeb)).to.be.equal(openpgp.util.Uint8Array_to_hex(signatureBN));
|
|
});
|
|
|
|
it('compare webCrypto and bn math verify', async function() {
|
|
if (!openpgp.util.getWebCrypto()) {
|
|
this.skip();
|
|
}
|
|
const bits = openpgp.util.getWebCrypto() ? 2048 : 1024;
|
|
const keyParams = await openpgp.crypto.generateParams(openpgp.enums.publicKey.rsa_sign, bits);
|
|
const n = keyParams[0].toUint8Array();
|
|
const e = keyParams[1].toUint8Array();
|
|
const d = keyParams[2].toUint8Array();
|
|
const p = keyParams[3].toUint8Array();
|
|
const q = keyParams[4].toUint8Array();
|
|
const u = keyParams[5].toUint8Array();
|
|
const message = await openpgp.crypto.random.getRandomBytes(64);
|
|
const hashName = 'sha256';
|
|
const hash_algo = openpgp.enums.write(openpgp.enums.hash, hashName);
|
|
const hashed = await openpgp.crypto.hash.digest(hash_algo, message);
|
|
let verifyWeb;
|
|
let signature;
|
|
try {
|
|
signature = await openpgp.crypto.publicKey.rsa.webSign('SHA-256', message, n, e, d, p, q, u, hashed);
|
|
verifyWeb = await openpgp.crypto.publicKey.rsa.webVerify('SHA-256', message, signature, n, e);
|
|
} catch (error) {
|
|
openpgp.util.print_debug_error('web crypto error');
|
|
this.skip();
|
|
}
|
|
const verifyBN = await openpgp.crypto.publicKey.rsa.bnVerify(hash_algo, signature, n, e, hashed);
|
|
expect(verifyWeb).to.be.true;
|
|
expect(verifyBN).to.be.true;
|
|
});
|
|
|
|
it('compare nodeCrypto and bn math sign', async function() {
|
|
if (!openpgp.util.getNodeCrypto()) {
|
|
this.skip();
|
|
}
|
|
const bits = 1024;
|
|
const keyParams = await openpgp.crypto.generateParams(openpgp.enums.publicKey.rsa_sign, bits);
|
|
const n = keyParams[0].toUint8Array();
|
|
const e = keyParams[1].toUint8Array();
|
|
const d = keyParams[2].toUint8Array();
|
|
const p = keyParams[3].toUint8Array();
|
|
const q = keyParams[4].toUint8Array();
|
|
const u = keyParams[5].toUint8Array();
|
|
const message = await openpgp.crypto.random.getRandomBytes(64);
|
|
const hashName = 'sha256';
|
|
const hash_algo = openpgp.enums.write(openpgp.enums.hash, hashName);
|
|
const hashed = await openpgp.crypto.hash.digest(hash_algo, message);
|
|
const signatureNode = await openpgp.crypto.publicKey.rsa.nodeSign(hash_algo, message, n, e, d, p, q, u);
|
|
const signatureBN = await openpgp.crypto.publicKey.rsa.bnSign(hash_algo, n, d, hashed);
|
|
expect(openpgp.util.Uint8Array_to_hex(signatureNode)).to.be.equal(openpgp.util.Uint8Array_to_hex(signatureBN));
|
|
});
|
|
|
|
it('compare nodeCrypto and bn math verify', async function() {
|
|
if (!openpgp.util.getNodeCrypto()) {
|
|
this.skip();
|
|
}
|
|
const bits = openpgp.util.getWebCrypto() ? 2048 : 1024;
|
|
const keyParams = await openpgp.crypto.generateParams(openpgp.enums.publicKey.rsa_sign, bits);
|
|
const n = keyParams[0].toUint8Array();
|
|
const e = keyParams[1].toUint8Array();
|
|
const d = keyParams[2].toUint8Array();
|
|
const p = keyParams[3].toUint8Array();
|
|
const q = keyParams[4].toUint8Array();
|
|
const u = keyParams[5].toUint8Array();
|
|
const message = await openpgp.crypto.random.getRandomBytes(64);
|
|
const hashName = 'sha256';
|
|
const hash_algo = openpgp.enums.write(openpgp.enums.hash, hashName);
|
|
const hashed = await openpgp.crypto.hash.digest(hash_algo, message);
|
|
const signatureNode = await openpgp.crypto.publicKey.rsa.nodeSign(hash_algo, message, n, e, d, p, q, u);
|
|
const verifyNode = await openpgp.crypto.publicKey.rsa.nodeVerify(hash_algo, message, signatureNode, n, e);
|
|
const verifyBN = await openpgp.crypto.publicKey.rsa.bnVerify(hash_algo, signatureNode, n, e, hashed);
|
|
expect(verifyNode).to.be.true;
|
|
expect(verifyBN).to.be.true;
|
|
});
|
|
});
|